Hi, On Mon, Apr 14, 2025 at 06:29:36PM +0000, Amin, Mostafa wrote: > Package: containerd > Version: 1.6.20~ds1-1+deb12u1 > Severity: important > Tags: security patch > User: t...@security.debian.org > Usertags: CVE-2024-40635 > > Dear Maintainer, > > I'm submitting a patch for CVE-2024-40635 in the containerd package. > > Vulnerability details: > - CVE ID: CVE-2024-40635 > - Description: Integer overflow in UID/GID handling allows containers to run > as root > - Affected versions: All versions prior to 1.6.38, 1.7.27, and 2.0.4 > - Fixed upstream in: > https://github.com/containerd/containerd/commit/11504c3fc5f45634f2d93d57743a998194430b82 > > The vulnerability allows containers launched with a User set as a UID:GID > larger than the maximum 32-bit signed integer to cause an overflow condition > where the container ultimately runs as root (UID 0) . > > My patch adds validation for UID/GID values to prevent integer overflow, > backported from the upstream fix. I've tested the patch and confirmed it > correctly rejects values larger than MaxInt32. > > The patch has been tested on Debian bookworm and works correctly. > > Thank you for considering this contribution.
A bug for this issue has already been filled (please double-check next time the BTS), I'm merging both reports. Regards, Salvatore